by Dutta | Jan 31, 2019 | Bomgar Discovery Tool, Data Security, Identity Management and Access Control, Privileged Access Management, Privileged Identity Management, Remote Support, Security
For those of us that make a habit of catching the nightly news, each day often seems like a replay of the previous: “Major Data Breach of Huge Corporation, details at 11.” And then you ask yourself, “could this happen to my organization?” Well, it can and probably...
by Dutta | Jan 29, 2019 | Access Control, Antivirus, Cyber security, Encryption, Endpoint Security, Identity Management and Access Control, Internet, Mobile Device Management, Mobile Security, Patch Management, Service Management, Unified Endpoint Management, Workspace Management
The majority of my colleagues running a security practice ended up there by accident. Most of them inherited a security role through necessity or promotion and only a few choose a security career. Either way, we are special people that don’t see daylight...
by Dutta | Jan 27, 2019 | Antivirus, Cyber security, Data Security, Home Network Security, Internet of Things, Internet Security, Mobile Security, Ransomware Protection Solution, Security
January 28 is Data Privacy Day. It’s a landmark calendar event observed in the United States, Canada, India and 47 European countries and it’s one which authorities take seriously. The US National Cyber Security Alliance and the Council of Europe lead the charge...
by Dutta | Jan 24, 2019 | Flexera-Software Asset Management Tools, FlexNet Code, Patch Management, SAM, Software Updater, Vulnerability Assessment, Vulnerability Management
For the second consecutive time, the Flexera team is pleased to announce that we have been recognized as a January 2019 Gartner Peer Insights Customers’ Choice for Software Asset Management Tools. We are extremely proud of this recognition, as feedback from...
by Dutta | Jan 22, 2019 | Cyber security, Security, Vulnerability Assessment, Vulnerability Management, Web Application Security, Web Security, Web Vulnerability Scanner
Analyzing web application vulnerabilities discovered by an automated scanner such as Acunetix often requires us to investigate further. This is in order to: Verify the vulnerability exists in the context of the application.Adjust the vulnerability payload reported by...